Document Details

ExhilaratingSugilite5127

Uploaded by ExhilaratingSugilite5127

Tags

information technology computer science IT audit

Summary

This document is a question bank, likely for an information technology course. It contains sample questions and answers related to various IT concepts, including audit software, data analysis, and system functions in a core banking system.

Full Transcript

Advanced ITT QUESTION BANK S.No. Questions Answer In IDEA, Statistics functions can be applied on_________. 1...

Advanced ITT QUESTION BANK S.No. Questions Answer In IDEA, Statistics functions can be applied on_________. 1 C A) Numeric Data B) Date Data C) Both A and B D) None of the above In IDEA, increment value in Stratification function can be fixed or free interval. 2 B A) FALSE B) TRUE In IDEA, Stratified Random functions is a part of which menu. 3 D A) Analysis B) Data C) Relation D) Sampling Which of the following is not an Audit Software 4 C A) ACL B) IDEA C) Unix D) SOFTCAAT Using which functions to perform more complex calculations and exception testing in 5 IDEA? A A) Equation Editor B) function Editor C) Calculation Editor D) Testing Editor Which of the following are categories of computer audit function ? 6 D A) Items of audit B) Data Analysis C) System validation D) All of the above interest In the following list which is a audit function? 7 B A) File Definition B) Stratification C) Print Preiview D) Append Which is the following step involved in a source code review methodology ? 8 A) Review B) Understand C) Formulate flaw D) All of the above D Programming program specifications hypotheses standards In IDEA which functions should be used to find repeated values ? 9 A A) Detection B) Exclude C) Sequence checking D) Filter In IDEA, Stratification functions can be applied on which type of data ? 10 D A) Numeric Data B) Date Data C) Character Data D) All of the above In IDEA,Summarization accumulates the values of Numeric fields for each____________. 11 B A) Primary Key B) Unique Key C) Secondary Key D) Composite Key In which sampling,selecting sampling units using a fixed interval between selections 12 is_______________. B A) Random B) Systematic C) All of the above D) None of the above Ensures that all combinations of sampling units in the population have an equal chance 13 of selection is____________. A A) Random B) Systematic C) All of the above D) None of the above Input Control method is a part of Application Control Group. 14 A A) TRUE B) FALSE Which is the following type of check that can be run when data is input through 15 terminal ? A A) Field check B) Filter check C) Compare check D) Data check In _______system money transfers are done on a one to one basis while in _______system 16 transfer is done in batches. B A) NEFT, RTGS B) RTGS,NEFT C) EFT,RTGS D) None of the above All the money transfers take place in the books of the _________________ 17 B A) Beneficiary bank B) Central bank(RBI) C) Remitting bank D) None of the above Page 1 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer ________system of money transfer is primarily used for large transactions. 18 B A) NEFT B) RTGS C) EFT D) All of the above In RTGS, the STP generates an ___________for every outbound RTGS transaction. 19 C A) UTN B) UTE C) UTR D) UTS STP stands for ________________________________ in terms of CBS. 20 A) Straight Through B) Straight Temporary C) Strict Through D) None of the above A Processing Processing Processing ________ is a method of creating virtual networks within a physical network. 21 A A) VLAN B) LAN C) WAN D) MAN CMS stands for ______________________________ in terms of CBS. 22 B A) Control B) Cash Management C) Core Management D) Centre Management System System System Management System Which of the following statements is true? A) Audit of internal B) Systems audit are C) Audit of controls in D) None of the above 23 controls is not needed important for the any banking B at all verification of the environment is internal controls performed using software audit The Management Controls does not include ___________ 24 A) Managing of Assets B) Formulating a C) Developing a D) Laying down A security policy business continuity procedures for system planning development _______is supported by advanced technology infrastructure and has high standards of business functionality. 25 C A) Firewall B) Internet banking C) Core Banking D) Web centre Solution CBS Software resides in a Central application server which is located in the ___________ 26 D A) ATM Data centre B) Middleware C) Web centre D) Central Office Data Centre. A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches. 27 B A) ATM Server B) Central Application C) Database Server D) Domain Name Server Server The _________of the application is capable of only entering the data at the end point that is branches. 28 C A) System version B) Application Version C) Client version D) Firewall The application server would be placed in a trusted inside zone in a separate ____________ 29 A A) Virtual Local Area B) Local Area Network C) Wide Area Network D) Personnal Area Network Network Application software would access the ________ 30 A A) Data base server B) ATM DATA Server C) Domain Name D) Application Server Server Page 2 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer __________ are capable of being connected only when devices are connected to a switch. 31 B A) LAN B) Virtual Networks C) MAN D) WAN _____________refers to the process of developing software which would produce the required output from the input provided of course, using the necessary hardware and 32 communication systems. D A) Application B) Software C) Server D) System Development Development Development Development The______________is essential to ensure that computer security records are stored in sufficient detail for appropriate period of time. 33 C A) Review B) RTGS C) Log management D) Authorized Management Controller All the various servers in the central data centre are seggregated through _______ 34 B A) LANs B) VLANs C) WANs D) MANs The __________ is a complete process in the computer so that it ensures that data that is 35 fed in conforms to certain prerequisite conditions. D A) Consalidation B) Password Policy C) protection D) Validation When the central Data base is busy with central end of day activities or for any other reason, the file containing the account balance of the customer is sent to the ATM 36 switch. Such a file is called __________ A A) Positive Balance B) Application Server C) Centralised Data D) Central Office Data File base security Centre. The IBDS is located in a ____________ 37 D A) Militarised zone B) City Zone C) State zone D) demilitarised zone The main components of Internet Banking system consist of __________ 38 D A) Web server B) IBAS C) IBDS D) All the above Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre 39 and pushed into all of the servers and in all the systems in the branches by ________ B A) Hacking Method B) Push-pull method C) Both A &B D) None of the Above The __________which is also residing in the server at the branch actually does the banking operations. 40 C A) Sytem software B) utility software C) Application D) Application Server Software In Core Banking concept all the systems of the bank are connected to the Central office 41 by means of a connectivity which may be either a _________ or a dial up line. B A) local line B) Leased line C) Broadband D) None The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer. 42 A) 16 digit number B) Personal C) Net transaction ID D) ATM No B Identification Number NO ____________would also include the existence of built in controls in the system to ensure 43 proper processing of input data so as to provide the required output. C A) Output Control B) Input control C) Process Control D) Data Control ____________refers to an arrangement wherein the issuing bank acts on the request and 44 instructions of a customer. A A) Letter of Credit B) Letter of Tax C) Letter of Payable D) Letter of Receible _______________ is a process by which the bank ensures the maintenance and recovery of operations. 45 B A) Business Recovery B) Business Continuity C) Disaster Recovery D) None Planning Planning Planning Page 3 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer At which phase of testing the version of software is called “ beta version”? 46 C A) Programmer B) User testing C) (a) & (b) both D) None of above testing Finacle developed by _________ 47 A A) Infosys B) HCL Technologies C) TCS D) I-Flex The number that is stored in the ATM switch is the difference of which of the following number? 48 C A) Pin No - offset value B) Offset value - Pin C) Pin No - Natural Pin D) Offset Value - No Natural Pin The information retrieval of transactions taking place at ATM located at remote locations is through _________ 49 A A) Soft copy of B) Hard copy of C) Cash register D) (a) and (b) both Electronic journal Electronic Journal The number that is generated as soon as the customer inserts the card in the ATM machine is __________ 50 C A) Offset value B) Pin sent to C) Natural Pin D) Card Number customer The tab in Expression Builder in which we write expressions is known as _____________. 51 C A) Expression B) Operator Button C) Expression Box D) Expression Builder Elements window The criteria expression LIKE?B*. 52 A) Will match all text B) Will match all text C) Will match all text D) Will match all text A starting from B ending from B having second starting with a digit character as B __________ queries are useful for summarizing information, and are somewhat similar to 53 pivot tables in MS-Excel. B A) Select query B) Crosstab query C) Action query D) Parameter query While entering record in Datasheet view, in which order the records can be entered 54 B A) Alphabetical Order B) At the end of the C) Any where in the D) Beginning of the table table table When you delete the record in form, it deletes the record from__________. 55 D A) Form only B) Form but not in C) Table but not in D) Form & Table table Form Having clause is used in the aggregate query in MS Access 2010 56 B A) FALSE B) TRUE The controls that are not linked to any field of the table or query on the form are known as ________. 57 B A) ActiveX control B) Unbounded C) Graphics Control D) Bound Controls Controls Which property of the form can be used to insert a background image in MS Access 58 2010? D A) Caption B) Background C) Record Source D) Picture ___________ is a report that is inserted in another report in MS Access 2010. 59 C A) Inner-Report B) Sub-Report C) Inside-Report D) Insert-Report Page 4 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer A bound main report is based on a ______________ and its _____________ contain realted information. 60 C A) Table or B) Table or query,Main- C) Table or query,Sub- D) None of the above query,Inner-Report Report Report DDL stands for ____________ 61 A A) Data Definition B) Data Defined C) Detailed Definition D) Data Detailed Language Language Language Language A___________used to compare multiple values of categories or differences over a period of 62 time. D A) Pie Chart B) Area Chart C) Bar Chart D) Column Chart A________used to compare trends over a period of time. 63 B A) Pie Chart B) Line Chart C) Bar Chart D) Column Chart To create a read-only copy of the database, which of the following file format can be 64 used? B A).ACCDB B).ACCDE C).MDW D).ACCDT The database administrator created a split database and created a front-end database and back-end database file.Which of the file should be stored on the server ? 65 B A) Front-end database B) Back-end database C) Both of them D) None of them In which formats can the Collect Data through email message feature can send the data entry form? 66 A A) HTML and InfoPath B) Access Forms C) Visual Basic D) Excel attachment Application Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can be checked using________________. 67 C A) Export to Outlook B) Options in Tool C) Manage replies D) All of the above menu of Access The ___________ type of data cannot be collected using Collect data through email 68 messages. D A) Text B) Number C) Date/time D) AutoNumber What is the memo data type field used for? 69 A) To add table B) To store objects C) For long text entries D) For shout text C created in other entries of no more programs than 255 characters The filter By selection feature allows you to filter: 70 A) Those records that B) Records based on a C) Records that meet D) All of above A match an entity in a criterion you specify any of several criteria field you specify DML stands for _____________ 71 A) Detailed B) Data Maintaining C) Data Manipulation D) Detailed C Maintaining Language Language Language Manipulation Language Which editor was provided for use with Access Basic? 72 B A) The Visual Basic 1.0 B) Notepad C) The QuickBasic D) All of above editor editor Page 5 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer How do you update Pivot Table report data after changes are made to the source data? A) Save your changes, B) Select the Pivot C) Click the report, and D) All of the above 73 close the workbook, Table worksheet and on the Pivot Table C and then reopen it. press F9 on the toolbar, click the keyboard refresh data button What are the different views to display a Table ? 74 D A) Datasheet View B) Design View C) Pivote Table & Pivot D) All Of Above Chart View Which Of The Following Creates A Drop Down List Of Values To Choose From? 75 D A) Ole Object B) Hyperlink C) Memo D) Lookup Wizard A __________ Enables You To View Data From A Table Based On A Specific Criterion 76 B A) Form B) Query C) Macro D) Report The Database Language That Allows You To Access Or Maintain Data In A Database 77 A A) DCL B) DML C) DDL D) None Of Above DCL Provides Commands To Perform Actions Like 78 A) Change The B) Insert, Update Or C) Authorizing Access D) None Of Above C Structure Of Tables Delete Records And And Other Control Data Values Over Database Which is not a Database Model ? 79 D A) Network Database B) Relational Database C) Object Oriented D) Structureed Model Model Database Model Database Model Which Of The Field Has Width 8 Bytes? 80 C A) Memo B) Number C) Date/time D) Hyperlink This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project. 81 A A) Data Definition B) Data Refinement C) Establishing D) None Of The Above Relationship Whenever a tables gets update, the dependent query will 82 B A) Not update B) update C) have to update D) never update automatically manually The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely 83 And Create A ___________ Between Tables A A) Relationship B) Join C) Query D) None Of These What is the purpose of the Switchboard Manager in Microsoft Access 2010? A) To build a main B) Creates the macros C) To allow the user to D) To allow changing 84 A switchboard form that used to program an switch from one from one report to controls all other automatic application. database file to another. forms. another. How does a query-based report differ in design to a report based on just one table? 85 A) The reports are B) It doesn’t C) It doesn't have as D) The only report B restricted in size. many design options. type available is the Design Report. Page 6 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer How would you include some plain text into a mailing label report? 86 A) Type the text B) Use the > button. C) Use the Mailing D) Use the >> button. C directly into the label. label wizard text option. In a Microsoft Access 2010 report, the page numbering would most likely be placed into 87 the: C A) Report Footer B) Section Header C) Page Footer D) Page Header If you wished to present a professionally looking form on screen that would show all the necessary information, which of the following form design tools would you most likely use? 88 C A) Pivot Table B) Pivot Chart C) All The tools of the D) Form Wizard form design control Columnar gallery. An.ACCDE file is a ___________ version of the original.ACCDB file. 89 B A) Fixed-down B) Locked-down C) Open-down D) None of the above Which type of the query is used to accept the value from the user while executing the 90 query and fetch records accordingly D A) Make Table Query B) Update Query C) Delete Query D) Parameter Query To encrypt the databse in Access 2010 must be opened in the __________________. 91 C A) Open Secure mode B) Open Inclusive C) Open Exclusive D) Open Read Mode mode mode To extract the records based on date field, which of the symbol should be used 92 B A) $ B) # C) () D) " " FIX() is a kind of ____ function in MS-Access 2010. 93 A A) Math B) Date C) Text D) None of the above MS-Access 2010 has added new features of ______ to eliminate the need of VBA code 94 A A) Macro B) Form C) Report D) None of the above Encrypting a database does not restrict access to database objects, but to __________ the 95 database. A A) Open B) Modify C) Read D) Write Third Party Encryption Technology can also be applied to the database of Microsoft 96 Access 2010. A A) TRUE B) FALSE To create a split database in MS Access 2010 go to which tab? 97 D A) Create Tab B) External Tab C) File tab D) Database Tools After spliting database,frontend database holds_________________. 98 D A) Forms B) Query C) Report D) All of the above After spliting database,backend database holds_________________. 99 A A) Tables B) Forms C) Query D) Report When an Access database is split, it creates two files_________________. 100 A) A back-end B) A new database & C) primary database & D) None of the above A database & front-end Old database. secondary database database Page 7 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer A Data Access Page is a special type of _________ that allows users to interface with 101 database using Internet Explorer. C A) XML page B) HTML Page C) Web page D) None of the above OLAP systems use concept of OLAP cube called a ______________ cube 102 C A) single dimensional B) hyper dimensional C) multi dimensional D) none The data which is to be exported from Tally.ERP 9 can be in ________ format. 103 D A) XML B) HTML C) ASCII D) ALL In Tally ERP-9 Remote Access is also known as __________. 104 C A) Networking B) VB.Net C) Tally.Net D) None of the above Accessing data store on a remote location using Internet in Tally.ERP9 is 105 called____________. B A) Local Data B) Remote Data C) Internet Data D) None of the above Tally.ERP9 can be classified user in two categories are___________. 106 C A) Local User B) Remote User C) Both A & B D) None of the above Which of the following is not a predefined security level provided by Tally.ERP 9? 107 B A) Owner B) Public User C) Data Entry D) Tally.NET User The business model is represented in the graphical form using ______________ and ________________ 108 C A) charts, pictures B) smart art, clip art C) flowcharts, flow D) graphs, shapes diagrams _______ integrates supply and demand mangement within and across companies. 109 B A) BPM B) SCM C) PLM D) CRM OLAP stands for _________________. 110 B A) Online Analysis B) Online Analytical C) Online Analytical D) None of the above Processing Processing Programming __________ includes transportation from Suppliers and receiving inventory. 111 A A) Inbound Operations B) Outbound C) Sourcing planning D) Production Operations planning Which of the following is not the service area of SCM? 112 D A) Logistics B) Asset Management C) PLM D) CRM Which step of the ERP implementation involves, educating and recruiting end users 113 throughtout the implementation process? B A) Step 1 B) Step 2 C) Step 3 D) Step 4 The system ____________ process will address issues such as software configuration, 114 hardware acquisition and software testing. C A) implementation B) upgradation C) installation D) migration A __________________ review is recommended to ensure that all business objectives established during the planning phase are achieved. 115 C A) pre implementation B) under process C) post D) None of the above review implementation In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing security configurations. 116 A A) post B) pre implementation C) Both A & B D) Either A Or B implementation Page 8 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________ 117 C A) Interactive B) Immediate C) Real Time D) Business Processing Processing Processing Processing Which of the following ETDS forms are available in Tally.ERP 9? 118 D A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above to 26 to 27 Annexure to 26Q The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called __________________ 119 B A) File Validation B) File Validation C) File Valuation D) File Valuation Program Utility Program Utility ERP systems provide an access to the__________ data 120 A A) integrated B) distributed C) isolated D) de-centralized ________________ is a tool that refers to skills, processes, technologies, applications and practices used to facilitate better, accurate and quicker decision making. 121 D A) Data Warehousing B) Data Modeling C) Business Modeling D) Business Intelligence Business intelligence systems are ________ Decision Support Systems. 122 A A) data-driven B) information driven C) resource driven D) none Data warehousing technology is the process of creating and utilizing the company’s 123 __________ B A) general data B) historical data C) operational data D) none The data in the Warehouse comes from the _________ environment and external sources. 124 A A) operational B) backup C) data D) none In essence, SCM integrates ___________ management within and across companies. 125 A A) supply and demand B) supply and chain C) supply and sortage D) none _____________ including all fulfillment activities, warehousing and transportation to customers. 126 B A) Inbound operations B) outbound C) hybridbound D) none operations operations Customer Relationship Management is a ________________ level strategy. 127 B A) business B) corporate C) strategic D) none Operational CRM provides support to ___________ business processes. 128 A A) front office B) back office C) staff D) none Collaborative ______ ultimate goal is to use information collected by all departments to 129 improve the quality of services provided by the company. A A) CRM's B) ERP C) SCM D) none Tally.ERP 9 follows the DES __________ method to safeguard the data. 130 A A) encryption B) decryption C) cryptography D) none Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________ 131 C A) Interactive B) Immediate C) Real Time D) Business Processing Processing Processing Processing Page 9 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Business Intelligence Systems are data-driven ___________________. 132 C A) Information B) Integrated C) Decision Support D) Non-Isolated Systems Information Systems Systems Information Systems Which of the following ETDS forms are available in Tally.ERP 9? 133 D A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above to 26 to 27 Annexure to 26Q The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called __________________ 134 B A) File Validation B) File Validation C) File Valuation D) File Valuation Program Utility Program Utility With ______________ technology the characters are reduced in breadth and user is allowed to input additional characters which would make the account name, entity complete 135 C and readable. A) Tally Fix B) Tally Adjust C) Tally Fit D) Tally AutoFit In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check the entries made by the authorised users and alter these entries, if 136 necessary. D A) User-defined B) HTTP-XML based C) Unlimited multi- D) Audit Feature Security data interchange user support __________________ is an enabling framework which establishes a connection through which the remote user can access the Client's data without copying/transferring the data. 137 C A) Direct Web B) Web Publishing C) Tally.NET D) Email facility Browser Access If we want the company to be connected automatically for remote access on load, the property __________ needs to be set it as Yes. 138 B A) Allow to Connect B) Contact On Load C) Either A or B D) None of the above Company ___________________ technology is the process of creating and utilizing the company's historical data. 139 A A) Data Warehousing B) Data Modeling C) Business Modeling D) Business Intelligence Is there a fixed qualification for internal auditor_________. 140 B A) TRUE B) FALSE Which of the following will not appear in the home page of K-Doc? 141 C A) Powerpoint B) Word C) Paste Document D) My Templates To change an email header so that the message appears to have originated from someone or somewhere other than the actual source is known as___________. 142 B A) Email middle B) Email Spoofing. C) Email hacking. D) Email tracking attack. To playfully satirize a website is known as_____________. 143 C A) Web tapping B) Web Interception C) Web spoofing D) Web threating _________is the complete package to manage the billing requirements of a CA firm on cash system of accounting. 144 C A) Payroll B) eSecretary C) Billing and D) K-DOC application Accounting software Which of the following is not a/an feature of eSecretary? 145 D A) Contact B) Greeting C) Email Management D) Share certificate Management Management printing Page 10 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Annual return preparation can be done using ________. 146 A A) ICAI-ROC B) K-DOC application C) ICAI XBRL Software D) Payroll application ________is correspondence automation & management software that is seamlessly integrated with Microsoft Office. 147 B A) K-DOC application B) eSecretary C) ICAI XBRL Software D) ICAI-ROC application ________ is an independent,objective assurance and consulting activity designed to add 148 value and improve an organization's operations. C A) Statutory audit B) Tax audit C) Internal auditiing D) None of the Above Which of the following is/are the main purpose of the internal audit? 149 C A) Financial reporting B) Operations of the C) Both A and B D) Either A or B organization As per _____________of the Income tax Act,every person carrying on business or profession 150 is requires to get his accounts audited by a CA before the "specified date". D A) Section 45 B) Section 44AD C) Section 43B D) Section 44AB __________________ refers to use software/applications to automatically perform tasks such 151 as accounting,preparing trial balance, financial statements etc. and electronically B A) ERP B) Office automation C) Either A or B D) None of the Above FEMA Stands for _______________. 152 A) Foreign Exports B) Financial C) Foreign Exchange D) None of the Above C Management Act Enterprise Managament Act Management Act Which application helps the management to allocate the revenue to the credit of the right employee who identified the opportunity? 153 A) Resource allocation B) Knowledge C) Document D) Client management D and scheduling management Management Systems Who has full privileges in the financial accounting application? 154 C A) Database B) Account C) System D) User Administrator administrator administrator administrator _________is the centre point of the financial accounting application as any transactions 155 having financial impact carried out in any other module will reflect in this module. B A) AP module B) GL module C) AR module D) FA module In Financial Accounting Application,the transactions flow from GL (General ledger) to 156 other modules. B A) TRUE B) FALSE Which of the functionalities is not provided in the purchasing module of Financial Accounting Application. 157 A) Evaluation of B) Receipts of goods or C) Invite and analyze D) Comparison with D Vendors service quotations from budgets vendors In Financial Accounting Application,automatic sequence number of documents control is not required in which of the following module? 158 C A) Purchasing B) Accounts Payable C) Expense D) Fixed assets Management Which module of Financial Accounting Application can be used for assigning credit limit to customers? 159 B A) Purchasing B) Sales C) Accounts Payable D) Accounts Receivable Page 11 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Which of these will trigger/alert for timely payment ? 160 C A) Accounts Payable B) Accounts C) Expense D) Bank Receivable Management Reconcilations We can manage interviews,offers and job vacancies by using which of the application? 161 A) Resource allocation B) HR and Payroll C) Knowledge D) None of the Above B and scheduling applications management ________,___________,__________ are commonly referred to as CIA in information security parlance. A) B) C) D) 162 A Confidentiality,Integrit Confidentiality,Integrit Confidentiality,Integrit Confidentiality,Integra y and Availability y and Authentication y and Access rights tion and Authentication ___________provides information about updation of project cost based on time spent by employees on various projects. 163 D A) Performance B) HR management C) Payroll D) Timesheet management system system application Which of the follwing is not a/an functionality provided by PMS? 164 A) Capture the Key B) Employee C) Automated alerts D) Prepare summary B Performance designation and for pending appraisals or bell curve analysis Indicators reporting structure of all employees ___________automates the calculation of salary for taking inputs from the timesheet application, leaves from Leave Management System and salary details from the HR 165 master data. C A) Timesheet System B) HR management C) Payroll System D) Knowledge System management System Which of the follwing is not a control in Leave Management System? 166 A) Reduce B) Excess leave C) Error free capture D) Approval workflow C administrative burden of leave details on HR Permanent Audit File are obtained once but updated on __________basis. 167 B A) half-yearly B) yearly C) monthy D) quarterly In Permanent Audit file, _______ is not the key data documented. A) Organization chart B) Client’s accounting C) Copies of clients’ D) Copies of important 168 C manual incorporation contracts or long term documents like MoC lease agreements ________is a type of training in which user logon on the training server with a user ID and password. 169 B A) Internal Training B) E-Learning C) Classroom Training D) E-Training In some cases, trainee is supposed to appear for the examination/test at the end of the training is____________. 170 B A) Classroom Training B) E-Learning C) Virtual Learning D) All the Above ________ are the hardware/infrastructure equipments used in a CA firm. 171 D A) PC B) Application Server C) WAN D) All the Above Page 12 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer _____________means information available in the organization should not be altered or 172 modified by unauthorized personnel. B A) Confidentiality B) Integrity C) Availability D) Authentication Which of these is/are the standard email program used in an organization? 173 C A) Microsoft Exchange B) Lotus Notes C) Both A and B D) None of the Above Which of the following is not a characteristics of WAN? 174 A) Most WANs are B) Compared to LAN, C) WAN uses only D) Switches are used B owned by only one its transmission speed private networks. to connect LAN and organization. is low WAN _________is protection of information assets from threats to preserve their value. 175 C A) Confidentiality B) Integrity C) Information D) None of the above Security Which types of information assets need to be secured in a CA Office? 176 D A) Client data B) Own data C) Own documents D) All the above The extent and level of _________ would depend on the nature of information. 177 B A) Availability B) Confidentiality C) Integrity D) Authentication __________ of information might be affected due to denial of service attack or some other 178 reasons. D A) Integrity B) Authentication C) Confidentiality D) Availability __________means the sender cannot deny having sent a message and receiver cannot deny 179 receiving the message. A A) Non-Repudiation B) Integrity C) Authentication D) Confidentiality Risk may not be _______ in nature. 180 D A) reputational B) financial C) operational D) vulnerable The process of identifying an individual, usually based on user id and password in an 181 organization is called______________. B A) Availability B) Authentication C) Confidentiality D) Integrity Which of the following is not a software equipment required in a CA's office? 182 A) Resource allocation B) Client management C) HR and Payroll D) None of the Above D and scheduling Which of the following is not an application arranged by ICAI? 183 D A) ICAI-XBRL suite B) K-DOC C) Billing and D) ICAI-TOC Accounting PBX stands for ________ 184 C A) Private Exchange B) Public Exchange C) Private Branch D) Public Branch Branch Branch exchange exchange ________ is the process of meeting the financial goals through the proper management of finances. 185 C A) Corporate planning B) Monte Carlo C) Financial planning D) Personal Finance simulation planning Page 13 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer ___________ can be defined as the process of setting the procedures in the organization for achieving the predefined goals. 186 B A) Monte Carlo B) Corporate Planning C) Decision Tree D) Corporate Planning Simulation Analysis & Analysis ________ shows ability of company to pay back long term loans along with interest or other charges from generation of profit from its operations. 187 B A) Debt Assets Ratio B) Interest Coverage C) Total Fund Ration D) None of the above Ratio _____________________is the simplest method of comparing different stocks at a point of time to make investment decisions. 188 C A) Earnings Per share B) Fixed Asset Over C) Price Earnings D) Gross Profit Ratio ratio Multiple The very first line of code of XML file is_____________. A) Every bit of data has to start and end with an identical tag 190 A) B) C) D) A Data Deletion of XML Map is done through __________. 191 C A) Directally Delete B) Delete Button C) XML Maps Dialog D) None of the above Command Box Excel works primarily with ________ types of XML files. 192 B A) 3 B) 2 C) 1 D) 4 Method of tax calculations shall change according to _________. 193 D A) Annual Income B) DOB C) status of assess D) All of the above. ________ is a process used in statistical analysis in which a predetermined number of observations will be taken from a larger population. 194 B A) Snowball sampling B) Sampling C) Systematic D) Simple random sampling sampling In __________, Individuals are selected at regular intervals from a list of the whole population. 195 C A) Clustered sampling B) Sampling C) Systematic D) Simple random sampling sampling In ______________ each individual is chosen entirely by chance and each member of the population has an equal chance, or probability, of being selected. 196 D A) Snowball sampling B) Convenience C) Systematic D) Simple random sampling sampling sampling Which method is commonly used in social sciences when investigating hard to reach groups? 197 C A) Quota Sampling B) Sampling C) Snowball sampling D) Simple random sampling __________ are useful for quick reading and easy understanding, particularly for top 198 management. B A) Balance sheet B) Summary reports C) IRR D) NPV Page 14 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Popular methods of capital budgeting include _________ and payback period. 199 D A) discounted cash B) internal rate of C) net present value D) All the above flow return _________ is the value of all future cash inflows less future cash outflows as on today. 200 A A) Net present value B) Working capital C) IRR D) PMT ___________is the process of defining and analyzing the dangers to individuals, businesses and government agencies posed by potential natural and human-caused adverse events. 201 B A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis analysis __________ which is used more often, does not involve numerical probabilities or predictions of loss. 202 C A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis analysis ________ are generally used to present information in a simple and better way and also be 203 used to analyse the risk in a better way. D A) Graphs B) Sparklines C) Both A& B D) Charts It is a technique used to determine how different values of an independent variable will impact a particular dependent variable under a given set of assumptions. 204 B A) Decision Tree B) Sensitivity analysis C) Both A& B D) Neither A &B analysis _______ involves computing different reinvestment rates for expected returns that are reinvested during the investment horizon. 205 A A) Scenario analysis B) Sensitivity analysis C) Decision Tree D) None Analysis Which function that is used to calculate the payment for specific loan terms ____________ 206 B A) SUMIF() B) PMT C) COUNTIF() D) None of the above ________helps to break down the Return on Equity 207 A A) Du Point Analysis B) Return on C) Profitability Ration D) None of the above Investment _______ is a common method for financing property, facilities, and equipment. 208 B A) Mortagage B) Leasing C) Rent D) All the above Which option can be used to split windows into four in ms excel 2010? 209 B A) Format -> Window B) Window -> Split C) View -> Window -> D) View -> Split Split How to restrict the values of a cell so that only a list can be entered in a cell? 210 A) Settings Tab under B) Settings Tab under C) Settings Tab under D) All of the above B the Tab Format -> the tab Data -> the tab Data -> Filter - Cells Validation >Advanced Filter What does the COUNTA() function do in MS Excel 2010 ? 211 D A) Counts cells having B) Counts empty cells C) Counts cells having D) Counts non-empty alphabets number cells If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ 212 ICAI " in cell C1? C A) A1+ "@" + B1 B) A1 # "@" # B1 C) A1 & "@" & B1 D) A1 $ "@" $ B1 Page 15 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer Which of the following function will return a value of 7? 213 A) B) C) ROUND(7.4999,0) D) Only B & C D ROUNDUP(7.4999,0) ROUNDDOWN(7.4999, 0) A tiny chart embedded in a worksheet cell that provides a visual representation of data 214 is a _________ B A) Bar Chart B) Sparkline C) Pivot Chart D) Pie Chart _________is a graphical equivalent of a pivot table, which is used to visualise PivotTable 215 report summary data B A) Bar Chart B) Pivot Chart C) Sparklines D) None of the above To frequently print a specific range of cells on a worksheet , the option used is 216 A A) Pagelayout -> Page B) Pagelayout -> Print C) Page Setup -> Print D) Print Area Setup -> Print Area Area Area Non-excel files can be opened in MS Excel using the 217 C A) Add Ins B) Developer Tab C) Text Import wizard D) Analysis Tool Pak _____is a text concatenation operator. 218 C A) # B) $ C) & D) * Which of the following is correct? 219 A) AVERAGE(4,5,6,7) B) C) D) All of the above D AVERAGE(A1,B1,C1) AVERAGE(A1:A6,B1:B 6) ___ function in MS-Excel returns the remainder after number is divided by divisor. 220 A A) MOD() B) INT() C) DIV() D) REMAINDER() EXCEL Work in ________ Mode 221 A A) 3 B) 5 C) 7 D) 11 In Ms-Excel 2010, ______ is Last Column Name? 222 B A) XWE B) XFD C) XAA D) AAA In Excel 2010, the default criteria setting for AutoFilter in each field is __________. 223 D A) Top10 B) Bottom10 C) Top half D) All Subtotal option is in __________ group of Data tab in Excel 2010. 224 B A) Sort & Filter B) Outline C) Data Tools D) Calculation Which of the following cannot store connection information of an external data source 225 in Excel 2010? C A) Workbook B).odc file C).htm file D).udcx file The default pivot chart type in Excel 2010 is a ________ chart. 226 A A) Column B) Line C) Scatter D) Bubble To consolidate Excel data, ________________________ is used when worksheet data does not have a consistent layout or pattern. 227 C A) Consolidation by B) Consolidation by C) Consolidation using D) Any of the above position category 3-D formulas Page 16 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer In Excel 2010, the __________ function is used to generate a forecast. 228 A A) TREND B) STANDARDIZE C) CORREL D) GROWTH ______function calculates the payment for a loan (installment) based on constant 229 payments and a constant interest rate. D A) PV B) NPV C) IRR D) PMT __________ are easy-to-use filtering components that enable the user to quickly filter the 230 data in a PivotTable report in MS-Excel 2010. B A) Sparklines B) Slicers C) Macros D) Data Forms In Excel 2010, range C3:C6 indicates _______________. 231 A A) Cells C3 through C6 B) Cell C3 and Cell C6 C) Cell C4 and Cell C5 D) None of the above Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________. 232 A A) Shift + F10 B) Shift + F1 C) Shift + F11 D) Shift + F12 To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding 233 _________ key. A A) Ctrl B) Alt C) Shift D) Ctrl + Shift A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell 234 address or range name in the ____________. A A) Name Box B) Formula Bar C) Zoom Box D) Sheet Tab In MS-Excel 2010, the Name Box shows the ________________________. 235 A) Name of the B) Name of the C) Name of the cell or D) Formula in the cell C workbook currently worksheet currently range currently currently working on working on working on working on In Excel 2010, what is represented by the small black square in the lower-right corner 236 of an active cell or range? B A) Copy handle B) Fill handle C) Insert handle D) Border Suppose we accidentally erased a record in an Excel worksheet. Which command can be 237 used to restore it immediately? D A) Insert B) Replace C) Paste D) Undo Excel 2010 offers up to____________sort levels. 238 B A) 32 B) 64 C) 60 D) 80 Which feature in Excel 2010 enables us to find the input values needed to achieve a goal 239 or objective? A A) Goal Seek B) Consolidate C) Data Validation D) Subtotal The INT function________ 240 A) Rounds a number B) Rounds a number C) Rounds a number D) Calculates interest B to a desired multiple down to the nearest up integer Which of the following statements about scenarios is not true? A) A scenario is a set B) A workbook can C) Scenarios provide a D) Scenarios help to 241 B of values saved with have one scenario per way to see different perform what-if the workbook. sheet. solutions for analysis. worksheet formulas. Page 17 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer What is a scenario summary report? A) A formatted B) A formatted defined C) A worksheet with a D) A worksheet with 242 A description of each range of Solver and separate thumbnail for separate macros for scenario on a separate Goal Seek solutions each formula each scenario worksheet What does Solver uses in its dialog box? 243 D A) Arguments B) Limitations C) Constraints D) Parameters What term describes a feature that gives Excel enhanced capability? 244 D A) Trendlining B) Enhancement bit C) Thumbnail D) Add-in What dialog box allows you to change a field name in a PivotTable? 245 C A) Field Options B) Field Pane C) Field Settings D) Field Structure Why are PivotTables considered interactive? 246 A) They allow you to B) They allow you to C) They allow you to D) They allow you to B add dynamic data. rearrange row and generate e-mail print the reports with column data. enabled reports. various settings. Identify the need for controls and auditing in a computerised environment. 247 A) Absence of input B) Lack of visible C) Accessibility of data D) All of the above D documents transaction trail and computer programs Grand totals calculated for any code on a document in the batch are called….. 248 D A) Financial totals B) Record totals C) Document totals D) Hash totals Control that checks if correct sequence of commands and update parameters are passed 249 from the application software to the database. B A) Table level B) Data Integrity C) Batch check D) System test With respect to data integrity control, when monetary transactions are processed 250 against master files without a match, we should maintain a …. C A) Sequence account B) Data account C) Suspense account D) Update account The system test that tests the top-level modules first and then the lower modules are 251 simulated with dummy modules to check the interfaces is called …. D A) Bottom up test B) Hybrid test C) Stub test D) Top down test Identify the audit technique that examines each transaction as it passes through the system. 252 A A) Embedded code B) Program code C) Database Analyzers D) Database code The Core Image Comparison audit technique compares the…. 253 A) Database with B) Executable program C) Transaction data D) Module programs B master table with master copy with master with snapshots transaction The technique used by an auditor to list unused program instructions is….. 254 C A) Modelling B) Analyzing C) Mapping D) Tracing The sample data created and used for the purpose of testing the application system is 255 called…. A A) Test data B) Table data C) Item data D) Record data Page 18 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer The test data (dummy unit) implemented in the normal processing of the system over a period of time is known as…. 256 A A) Integrated Test B) Black box Test C) Graph testing D) Whitebox testing Facility Facility The test data generated with correctness proof, data flow analysis and control flow 257 analysis tools is called…. B A) Test item block B) Test data pack C) Test program pack D) Test record pack The organisational, management, maintenance and access controls are categories of …… 258 B A) Application B) General controls C) Check controls D) Input controls controls When a real-time system is simulated to generate the same output as the real-time system, the technique is called…. 259 D A) Parallel trailing B) Tracing parallel C) Parallel coding D) Parallel simulation When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is…. 260 B A) Cross reference B) Formulate flaw C) Correct lister D) Formulate correct lister hypotheses hypotheses This is an important control in systems that use digital signatures for authentication purposes. 261 A A) Public audit trails B) Random audit trails C) Sample audit trails D) Data audit trails Selecting transactions based on a sampling rate is called …. method. 262 B A) Transaction B) Systematic C) Simple sampling D) Demographic sampling sampling sampling The capability of the generalized audit software to read different data coding schemes, different record formats and different file structures is…. 263 C A) File size B) File data C) File access D) File reorganisation The audit software capability of frequency analysis is to…. 264 D A) Sort and merge files B) Sampling nth item C) Formatting output D) Classify data on a criteria The audit functions of attributes sampling, variables sampling, stratified sampling are 265 included in …. functions. C A) Stratification B) Selection C) Statistical D) Reporting Identify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact. 266 A) Ex Post Auditing B) Analytical review C) Limited ability to D) Limited ability to A Only only determine Propensity Verify Processing logic for Error The purpose-written audit programs are used for….. A) Sorting, creating, B) Data retrieval, code C) Reading data, D) Specific tasks with 267 D and printing files comparison selecting and original or modified analyzing information programs Picture of a transaction as it flows through the computer systems is called….. 268 C A) Program B) Track C) Snapshot D) Picture Page 19 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer The application controls are …. 269 C A) Input controls B) Processing controls C) Both A and B D) Neither A nor B Identify the type of audit when auditors are members of the systems development 270 team. D A) General audit B) Post audit C) System audit D) Concurrent audit Identify the field check - "If a set of values is defined, is the input data one of these 271 defined values?" C A) List B) Range C) Slab D) Digit The field check that conforms if data input for a field is in a particular format. 272 A A) Format mask B) Data mask C) Field mask D) Input mask The field check on a processed data that fails if a field is not initialized to zero or errors 273 occur during calculation is…… C A) Range B) Sign C) Overflow D) Serial The validation checks applied to a field depending on its logical interrelationships with 274 the other fields in the record are called ….. B A) Field checks B) Record checks C) Batch checks D) File checks A group of records or transactions that are contiguous constitute ….. 275 A A) Physical batches B) Logical batches C) Block batches D) Transact batches …………..is the type of batch check (group of records) for all input records of a particular 276 type is done. C A) Control totals B) Serial number C) Transaction type D) Sequence check DB2 is an example of __________ 277 C A) ODBMS B) RDBMS C) DBMS D) None ____________is used to Modify/Change Data in Table 278 A A) Update Query B) Process Query C) Insert Query D) None MS-Access is _________________ 279 A A) DBMS B) RDBMS C) ODBMS D) None Which of the following is not a data type in MS-Access? 280 B A) Number B) Character C) Memo D) Date To make changes in MS-Access form should be opened in __________________ 281 B A) Form view B) Form Design C) Change Form D) None _______layout of a form displays one record at a time 282 B A) Tabular B) columnar C) Datasheet D) None In SQL, DML stands for _________ 283 A A) Data manipulation B) Data mathematical C) both a and b D) None language language To see more than one record at a time in a form we use _______ 284 A A) Tabular B) columnar C) both a and b D) None The default query invoked by ms-access is 285 B A) Update Query B) Select Query C) Delete Query D) None Page 20 of 31 Advanced ITT QUESTION BANK S.No. Questions Answer __________ software serves as the Intermediary between the user and the database 286 B A) DATABASE B) DBMS C) O.S D) None Distributed database have now come to know as a __________ database 287 C A) Client data base B) Server data base C) Client-Server D) None database DDL Stands for -. 288 C A) Data Design B) Define Data C) Data Definition D) None Language Language Language In DBMS, view level data abstraction is known as __________ 289 C A) Internal Schema B) Conceptual Schema C) External Schema D) None In DBMS, Normalization concept responsible for _______________ 290 B A) Increase data B) Reduce C) Increase Efficiency D) All duplication Redundancy one 2 one, one 2 many and many 2 many Relationship exist in _________ model 291 C A) Hierachical B) FLAT FILE SYSTEM C) Relational model D) None Record is also known as ________ in a Relational data base 292 C A) Attribute B) Entity C) Tuple D) None ____________ is extention of ACCESS DATABASE 293 C A).mdb B).dbf C).accdb D) None Default length of numeric data type is ____________ 294 D A) 255 char B) 16 chra C) text D) long Integer Default value option in field property use for ________ 295 A A) enter a value B) for checking C) for validation check D) None automatically Value of Report Header exist on ___________ page of report 296 B A) every B) first C) last D) None __________ is an action or set of actions that you can use to automate tasks 297 C A) program B) check C) macro D) All SQL is a _________ Language 298

Use Quizgecko on...
Browser
Browser